Date post: | 18-May-2015 |
Category: |
Technology |
Upload: | mike-kavis |
View: | 819 times |
Download: | 1 times |
Implications for security delivery: Saas, PaaS, and IaaS and virtualized environments
Mike Kavis, InmarVP, Digital Promotions Systems
January 24, 2012
JP Morgenthal, SmartronixCloud Evangelist
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
2
How do we secure these
different service
models?
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
3
On Premise
IaaS
PaaSSaaS
Amount of security outsourced
Amou
nt o
f sta
ndar
diza
tion
requ
ired
Service Models Realities
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
4
On-Premise
Network
Server
Application
ID Management
OS
Authentication
Access
Storage
Authorization
Application configuration
Consumer
It’s ALL you!
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
5
Network
IaaS
Server
Application
ID Management
OS
Authentication
Access
Storage
Authorization
Application configuration
Consumer
Provider Network
Outsourcing the security perimeter
Server Storage
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
6
Server OS Storage
PaaS
Application
ID Management
Authentication
Access
Authorization
Application configuration
Perimeter
Server OS Storage
Consumer
Provider
Outsourcing the application platform
Authentication
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
7
Application Authentication Authorization
SaaS
Perimeter
Server
Application
ID Management
OS
Authentication
Access
Storage
Authorization
Application configuration
Consumer
Provider
Outsourcing the application
Access
®
© 2012 Inmar®, Inc. CONFIDENTIALNot to be reproduced or distributed without written permission from Inmar
Common across all service models
SLAs
Compliance
Privacy
ChangeControl
Controls